mahendras

Subscribe Mahendras Youtube Channel | Join Mahendras Telegram Channel | Like Mahendras Facebook Page | Online Admission | Download Mahendras App

Now Subscribe for Free videos

Subscribe Now

Computer Knowledge Questions | NICL AO 2017 | 06.05.2017

Mahendra Guru
Computer Knowledge Questions | NICL AO 2017 | 06.05.2017

1. Application layer firewalls works on the application level of the ____stack (i.e.all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: 

a) TCP 

b) IP 

c) Both of Above 

d) OFC 

d) None of These 

2. From 1989 -1990 three colleagues from AT & T Bell Laboratories, Dave Presotto,Janardan Sharma and Kshitij Nigam developed the second generation of firewalls, calling them: 

a) Circuit Level Gateway 

b) Application Layer 

c) Proxies 

d) VPN 

e) None of These 

3. The first type of firewall was the packet filter which looks at: 

a) Network addresses 

b) Ports of the packet and determines if that packet should be allowed or blocked 

c) Both of above 

d) Router 

d) None of These 

4. ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: 

a) Circuit Level Gateway 

b) Proxy Server 

c) Packet Filter 

d) Payment Gateway 

e) None of These 

5. A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: 

a) Hardware 

b) Software 

c) Both hardware or software 

d) Virus 

e) None of These 

6. INTER POL stands for: 

a) International Police 

b) Internal Polythims 

c) Internet Protocol 

d) None of These 

e) Internet pools 

7. MOD refers to: 

a) Monitor of Deception 

b) Master of Deception 

c) Management of Deception 

d) Management of Decision 

e) None of These 

8. IRC stands for: 

a) Internet Relay Chat 

b) Internal Rely Chat 

c) Information Relay Chat 

d) Intelligent Relay chat 

e) None of These 

9. Which among the following are Malicious Software’s: 

a) Virus and Worms 

b) Trojan Horse and Time Bomb 

c) Logic Bomband Rabbit and Bacterium 

d) None of These 

e) All of the Above 

10. Credit Card Fraud includes: 

a) Credit cards are illegally get and used to get movable or immovable property 

b) Unauthorized and illegal use of credit cards 

c) Both of Above 

d) Payment Gateway 

e) None of These 

SOLUTION

1-c  2-a  3-c  4-B  5-C  6-a  7-B  8-a  9-e  10-C

0 comments:

Post a Comment

MAHENDRA GURU

Copyright © 2023 www.mahendraguru.com All Right Reserved by Mahendra Educational Pvt . Ltd.